Image Security Using Cellular Automata Rules

  • Manoj Diwakar
  • Pratibha Sharma
  • Sandip Swarnakar
  • Pardeep Kumar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 258)


In this age of universal electronic connectivity, there is no time at which security does not matter. With the increase in usage of transmission of digital images over the network, there is need of more secure systems. The main aim of this paper is to achieve two main principles of security i.e. authenticity and confidentiality, particularly for transmission of images over a network. Authenticity ensures that only the intended receiver is able to receive the message and confidentiality ensures that the message is confidential. For achieving these two principles, there are lots of mechanisms available, e.g. the most common practices for achieving authenticity are passwords, access control etc. and for achieving confidentiality, there are lots of symmetric and asymmetric encryption methods available. In this paper, a two-level security mechanism has been presented. This two level security ensures authenticity at one level and confidentiality at another level. For achieving first level of security, the image to be send is hidden behind another image using Stenographic methods and for achieving second level of security, the image would be encrypted using 2D Cellular Automata (CA) rules. If one level of security is broken, then the other level would provide security.


Cellular automata Steganography Cryptography 


  1. 1.
    Younes, M.A.B., Jantan, A.: An image encryption approach using a combination of permutation technique followed by encryption. Int. J. Comput. Sci. Netw. Secur. 8, 191–197 (2008)Google Scholar
  2. 2.
    Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis. Comput. 26, 843–850 (2008)CrossRefGoogle Scholar
  3. 3.
    Pratibha, S., Diwakar, M., Lal, N.: Edge detection using Moore neighborhood. Int. J. Comput. Appl. 61(3), 26–30 (2013)Google Scholar
  4. 4.
    Pratibha, S., Diwakar, M., Choudhary, S.: Application of edge detection in brain tumor detection. Int. J. Comput. Appl. 58(16), 21–25 (2012)Google Scholar
  5. 5.
    Maji, Pradipta, Shaw, Chandrama, Ganguly, Niloy, Biplab, K.S., Chaudhuri, P.P.: Theory and application of cellular automata for pattern classification. Fundamenta Informaticae 58, 321–354 (2003)MATHMathSciNetGoogle Scholar
  6. 6.
    Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Solitons Fractals 35, 408–419 (2008)CrossRefMATHMathSciNetGoogle Scholar
  7. 7.
    Nandi, S., Kar, BK., and Chaudhuri, PP.: Theory and applications of cellular automata in cryptography. IEEE Trans. Comput. 43(12), 1346–1357 (1994)Google Scholar
  8. 8.
    Munshi, S., Maity, S.: A cellular automata based network security model. In: IEEE Second International Conference on Emerging Applications of Information Technology, 2011. pp. 75–279Google Scholar
  9. 9.
    Fateri,S., Enayatifar, R.: A new method for image encryption via standard rules of CA and logistic map function. Int. J. Phys. Sci. 6(12), 2921–2926 (2011)Google Scholar
  10. 10.
    Al-Shatnawi, A.M.: A new method in image steganography with improved image quality. Appl. Math. Sci 6(79), 3907–3915 (2012)Google Scholar
  11. 11.
    Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. Proceedings of the Workshop on Multimedia Security at ACM Multimedia, 2002Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  • Manoj Diwakar
    • 1
  • Pratibha Sharma
    • 2
  • Sandip Swarnakar
    • 1
  • Pardeep Kumar
    • 3
  1. 1.DIT UniversityDehradunIndia
  2. 2.Dronacharya College of EngineeringGurgaonIndia
  3. 3.Jaypee University of Information TechnologySolanIndia

Personalised recommendations